The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over their deposited funds.

The Venus Protocol user signed a malicious delegation transaction, granting the attacker’s contract control over their deposited funds.